[Linux-users] recent vulnerabilities in the Linux kernel

Robert Lukens rlukens at jlab.org
Thu Nov 5 10:40:41 EST 2009


FYI:

A couple of vulnerabilities have been reported in the Linux kernel.
Redhat has posted a fix which will be distributed on site through our
standard patch update process on Tuesday, November 17 (see
http://cc.jlab.org/announce/status.html).

Please reboot your JLab-managed Linux machines on Wednesday, Nov 18, to
make the update complete.


If you are not running the Lab's standard Red Hat distribution, please
check you vendor's patch notices for a kernel update.

Details on the vulnerability can be found at the following URLs:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2695
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3547

Thanks.

Bob


-- 
    Robert J. Lukens                                  Jefferson Lab
    Computer Security Manager        12000 Jefferson Ave - Suite #7
                                              Newport News VA 23606
    rlukens at jlab.org   757-269-6376                             USA



-------- Original Message --------
> Subject: [TAM Newsletter] Proactive Notification: Local privilege
> escalation - CVE-2009-3547 and CVE-2009-2695
> Date: Wed, 04 Nov 2009 10:16:25 -0500
> From: tam-newsletter at redhat.com
> Reply-To: tam-newsletter at redhat.com
> To: tam-newsletter at redhat.com
>
> Issue:
>      kernel: fs: pipe.c null pointer dereference (CVE-2009-3547)
>      kernel: SELinux and mmap_min_addr (CVE-2009-2695)
>
> Those Affected:
>      All currently supported versions of Red Hat Enterprise Linux
> including MRG
>
>
> Fix/Workaround:
>      MRG: https://rhn.redhat.com/errata/RHSA-2009-1540.html
>      RHEL 5: https://rhn.redhat.com/errata/RHSA-2009-1548.html
>      RHEL 4: https://rhn.redhat.com/errata/RHSA-2009-1541.html
>      RHEL 3: https://rhn.redhat.com/errata/RHSA-2009-1550.html
>
>
> Details:
> Two NULL pointer dereference vulnerabilities were made public on 
> November 3rd. Either could allow users with access to a system to
> elevate their privledges. They are rated by the Red Hat Security
> Response Team with a security impact of "Important". Several other
> bugs and security issues are also addressed with the updated kernels.
> All users of Red Hat Enterprise Linux are encouraged to updated their
> kernels. if you have questions or need more information, please
> contact your TAM.
>
> The TAM newsletter is provided by Red Hat Global Support Services to
> better serve our customers. Red Hat would like your opinion on the
> services you have been receiving and the value of this newsletter.
> Please submit your feedback via email to taofeedback at redhat.com If you
> would like to unsubscribe or change your subscription information,
> please visit the link below.
> _______________________________________________
> Tam-newsletter mailing list
> Tam-newsletter at redhat.com
> https://www.redhat.com/mailman/listinfo/tam-newsletter


More information about the Linux-users mailing list